Sciweavers

858 search results - page 53 / 172
» User Authentication in Sensor Networks
Sort
View
ADHOCNOW
2010
Springer
14 years 11 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
MOBICOM
2009
ACM
15 years 4 months ago
Impact of mobility on spectrum sensing in cognitive radio networks
In cognitive radio networks (CRNs), spectrum sensing is key to opportunistic spectrum access while preventing any unacceptable interference to primary users’ communications. Alt...
Alexander W. Min, Kang G. Shin
TMC
2012
13 years 8 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
DCOSS
2007
Springer
15 years 1 months ago
Efficient and Distributed Access Control for Sensor Networks
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
Donggang Liu
SOUPS
2010
ACM
15 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell